CCA secure type-based proxy re-encryption in the adaptive corruption model without random oracle
- 10.2991/csss-14.2014.69How to use a DOI?
- adaptive corruption model; CCA secure; type-based proxy re-encryption; proxy-invisible
Type-based proxy re-encryption can solve the fine-grained delegation perfectly, and being more and more important in applications. However, as we know, there is still a problem come up with type-based proxy re-encryption in adaptive corruption model. In this paper, we propose a typed-based proxy re-encryption in the adaptive corruption model without random oracle; the scheme is CCA secure and proxy- invisible. Compared with the type-based proxy re-encryption proposed by J.S.D in 2013, this scheme has advantages in both security and efficiency.
- © 2014, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Yanni Chang AU - Mingxing He PY - 2014/06 DA - 2014/06 TI - CCA secure type-based proxy re-encryption in the adaptive corruption model without random oracle BT - Proceedings of the 3rd International Conference on Computer Science and Service System PB - Atlantis Press SP - 293 EP - 296 SN - 1951-6851 UR - https://doi.org/10.2991/csss-14.2014.69 DO - 10.2991/csss-14.2014.69 ID - Chang2014/06 ER -